A security protection method and terminal for VR resources
A security protection and resource technology, applied in the field of data processing, can solve the problems of large space, large space and time, and difficulty in protecting the rights and interests of service providers, and achieve the effect of reducing space and time
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0055] This embodiment provides a security protection method for VR resources, including:
[0056] S1. Encrypt the VR resource stored on the disk by means of a memory-mapped file to obtain an encrypted file. Specifically:
[0057] S11. A preset key information table; the key information table stores a key corresponding to each encryption operation.
[0058] S12. Obtain the startup time of the system, and obtain the first key.
[0059] S13. Obtain the key corresponding to the last encryption operation from the key information table to obtain the second key.
[0060] S14. Using the first key and the second key as input parameters of a preset random algorithm, calculate a random value.
[0061] Optionally, the random algorithm is an elliptic algorithm.
[0062] S15. Set a start encryption position and an end encryption position corresponding to the VR resource according to the random value to obtain an encryption interval.
[0063] For example: Get the byte size of VR resour...
Embodiment 2
[0072] This embodiment provides a security protection terminal for VR resources, including one or more processors 1 and a memory 2, the memory 2 stores a program, and is configured to be executed by the one or more processors 1 in the following steps :
[0073] S1. Encrypt the VR resource stored on the disk by means of a memory-mapped file to obtain an encrypted file. Specifically:
[0074] S11. A preset key information table; the key information table stores a key corresponding to each encryption operation.
[0075] S12. Obtain the startup time of the system, and obtain the first key.
[0076] S13. Obtain the key corresponding to the last encryption operation from the key information table to obtain the second key.
[0077] S14. Using the first key and the second key as input parameters of a preset random algorithm, calculate a random value.
[0078] Optionally, the random algorithm is an elliptic algorithm.
[0079] S15. Set a start encryption position and an end encryp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com


